05.12.2012 Views

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

signal-processing algorithms, allows the scheduling <strong>and</strong> resource allocation to be done at compile time, rather than at run time<br />

as in usual data flow systems. Therefore hardware requirements can be kept low. Because of the special kind of algorithms<br />

we are dealing with, it is possible to use techniques from the field of operations research for i. the evaluation of the minimum<br />

computation time exploiting the inherent parallelism of a given algorithm <strong>and</strong> ii. the schedule optimization under limited<br />

resources or other resource constraints.<br />

Author<br />

Parallel Processing (Computers); Architecture (Computers); Signal Processing; Signal Analyzers; Information Flow;<br />

Operations Research<br />

20060002184 Concordia Univ., Montreal, Quebec, Canada<br />

Structure of the Submarking Reachability Problem <strong>and</strong> Network Programming<br />

Thulasiraman, K.; Comeau, Marc A.; 1987 IEEE International Symposium on Circuits <strong>and</strong> Systems, Volume 2; 1987,<br />

pp. 487-490; In English; See also 20060002103; Copyright; Avail.: Other Sources<br />

Using a linear programming formulation, a solution to the submarking reachability problem for marked graphs is<br />

presented. In both capacitated <strong>and</strong> uncapacitated cases the problem reduces to that of testing feasibility of the dual<br />

transshipment problem of operations research. An algorithm called REACH is presented for the feasibility testing problem <strong>and</strong><br />

its worst-case time complexity is O(mn), where m <strong>and</strong> n are, respectively, the number of edges <strong>and</strong> the number of nodes in<br />

the marked graph.<br />

Author<br />

Linear Programming; Computer Networks; Algorithms; Operations Research; Feasibility<br />

20060002286 Mitre Corp., USA<br />

Evaluations of Sana <strong>and</strong> Cisco Host Intrusion Prevention Systems (HIPS)<br />

Coover, Edwin R.; Thomson, Duncan; Proceedings of the Fifth Integrated Communications, Navigation, <strong>and</strong> Surveillance<br />

(ICNS) Conference <strong>and</strong> Workshop; November 2005, pp. 1-31; In English; See also 20060002231; Original contains color<br />

illustrations<br />

Contract(s)/Grant(s): DTFA01-01-C-00001; No Copyright; Avail.: CASI: A03, Hardcopy; Available from CASI on CD-ROM<br />

only as part of the entire parent document<br />

This report was undertaken as part of CAASD’s Information Security Systems (ISS) technology research for the Federal<br />

Aviation Administration’s (FAA) National Airspace System (NAS). The evaluation of Host Intrusion Prevention Systems<br />

(HIPS) was one part of a broader investigation in assessing the potential for an ‘adaptive quarantine,’ whereby a wide variety<br />

of attacks on NAS networks <strong>and</strong> computers could be identified, isolated <strong>and</strong> defeated. Sana’s assessment was that<br />

anomaly-based product required ‘training’ in what was expected to be ‘normal’ patterns, primary response generated many<br />

false alerts (Type 1 errors). Sana also failed to catch a number of known Solaris exploits (Type II errors) One of these failures<br />

was due to the fact that they were running an early version of Solaris 8. MITRE concluded that Sana’s product was immature;<br />

not recommended for an FAA pilot implementation. CASA’s assessment was that like Sana’s Primary Response, there are<br />

coverage issues, with CSA currently limited to Windows, Solaris <strong>and</strong> Linux. CSA is extremely complex with literally hundreds<br />

of rule <strong>and</strong> configuration options. CSA passed all CAASD tests. CAASD believes that CSA is worthy of being called a<br />

‘Host-based Intrusion Prevention System’ (HIPS).<br />

Derived from text<br />

Intrusion; Prevention; Warning Systems; Computer Programming; Protection<br />

20060002289 Frequentis G.m.b.H., Vienna, Austria<br />

SIP Based Communications in Netcentric Operations<br />

Prinz, Johannes; Kampichler, Wolfgang; Kurth, Christoph; Osrael, Johannes; Proceedings of the Fifth Integrated<br />

Communications, Navigation, <strong>and</strong> Surveillance (ICNS) Conference <strong>and</strong> Workshop; November 2005; 18 pp.; In English; See<br />

also 20060002231; Original contains color illustrations; No Copyright; Avail.: CASI: A03, Hardcopy; Available from<br />

CASI on CD-ROM only as part of the entire parent document<br />

Netcentric Operations is a buzz word emerging from the defense community. It refers to an operational concept which<br />

is based on having the same level of service literally from anywhere. Although being an operational concept. netcentric<br />

operations heavily rely on powerful technical solutions for information exchange <strong>and</strong> service architecture. The latest<br />

development showed that IP-solutions are also going to exp<strong>and</strong> into the area of safety critical voice communication systems.<br />

This paper elaborates two aspects of the implications of introducing IP based communication systems on a system <strong>and</strong><br />

140

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!